Managing Cybersecurity Break-ins Using Bluetooth Low Energy Devices to Verify Attackers: A Practical Study

Kenneth C. K. Wong, Aaron Hunter. Managing Cybersecurity Break-ins Using Bluetooth Low Energy Devices to Verify Attackers: A Practical Study. In Paolo Mori, Steven Furnell, Olivier Camp, editors, Information Systems Security and Privacy - 4th International Conference, ICISSP 2018, Funchal, Madeira, Portugal, January 22-24, 2018, Revised Selected Papers. Volume 977 of Communications in Computer and Information Science, pages 201-214, Springer, 2018. [doi]

Abstract

Abstract is missing.